CLOUDSEC_CHALLENGE
YOUR CHALLENGE
REGISTER TO CHALLENGE
KEY HIGHLIGHTS
HANDS-ON LAB
LIVE TALK SHOW
Ready Set Play Ready Set Play
24 Hours of Non-Stop Play
Download Keynotes Agenda

Schedule : HOL Challenge opens at
17 Nov - 10 AM (UTC -6) / 11PM (UTC +8) / 5 PM (UTC +2)

YOUR
#CLOUDSEC_
Challenge

Register Now

Gear Up for CLOUDSEC_Challenge Hands-On Lab

Test your wits against the best!

We are going Global with 24 Hours of Challenges and Live Talk Show. Technical prodigies, cloud builders, threat hunters, SOC members and CISOs across the world will compete to protect their dynamic environments & valuable assets from cyber threats. 5 Unique Challenges, prizes of your choice and real-world insights.

Ready. Set. Play.

What to Expect in

CLOUDSEC_
Challenge

24 hours of:

  • Non-Stop Challenges! 5 Challenges to choose from.
  • Insightful Live Streaming with live talk show and commentary

Have you registered to attend CLOUDSEC 2021?

Ready Set Play
  • 24 Hours Hands-On Labs
  • 24 Hours Live Streaming (Talk Show & Live Commentary)
  • America, APAC, EMEA
  • 5 Unique Tech-Focused Challenges

Target Audience

  • Cloud Builders
  • SOC
  • Threat Hunter
  • Security Professional
Schedule :
HOL Challenge opens at 17 Nov -
10 AM (UTC -6) / 11PM (UTC +8) / 5 PM (UTC +2)

24 Hours Hands-On Labs Challenge

CLOUD ARCHITECT CHALLENGE >
EMPOWER YOUR SOC CHALLENGE >
DEVSECOPS CHALLENGE >
RISK VISIBILITY AND GUIDED RESPONSE CHALLENGE >
ULTIMATE TEAM CHALLENGE >

LIVE TALK SHOW

Devops

Unifying DevOps and Security​

Our experts share insights on the recent history of DevOps and security and how the merging of the two demands organizational change. Know how to strike the balance between agility and security in DevSecOps with best practices like - shift Left and automation, as well as key trends for the future.

SOC

Enriching SOC Visibility​//The State of SOC​

Dive and discuss the state of SOC and how visibility for the SOC can be improved in current times. Enable and better prepare your security teams to take on threat actors in the future. Explore with our experts the latest trends in the industry: CISO’s preference for a vendor consolidation strategy, how remote work has brought in the Zero Trust model and the necessity of detection & response(XDR).

HACKERS

Inside the mind of a hacker​

In recent years, the advancement and uptake of cloud computing have eroded the traditional network perimeter, providing hackers with an ever-increasing number of access points to enterprise resources to exploit. However, much of a hacker’s toolkit is also a deep understanding of the cognitive weaknesses we all have when using technology – termed as social engineering. Though many hackers are driven by monetary gain or a challenge, hackers nowadays wear various hats – and some wear it for good as well. We dive into the mind of a hacker and explore what motivates them, and how their perception might not always hold true in reality.

SPEAKERS

  • andrew-chen
    Andrew-Chen

    Director Product & Service Management, Trend Micro

  • Ashis-Rajan
    Ashis-Rajan

    Head of Security and Compliance, PageUp & Host, Cloud Security Podcast

  • Dave-Stauffacher
    Dave-Stauffacher

    Chief Platform Engineer, Direct Supply

  • David-Sancho
    David-Sancho

    Senior Threat Researcher, Trend Micro

  • Fiona-Griffin
    Fiona-Griffin

    Cloud Solution Architect, Trend Micro

  • Kevin-Mead
    Kevin-Mead

    Senior Threat Researcher, Trend Micro

  • Paul-Pajares
    Paul-Pajares

    Senior Threat Researcher, Trend Micro

  • Andrew McLelland
    Andrew McLelland

    Cloud Business Development Director, Trend Micro

  • Nitin Patil
    Nitin Patil

    Principle Sales Engineer, Trend Micro

  • Grace Yu
    Grace Yu

    Alliance Manager AMEA, Trend Micro

  • Funda Cizgenakad
    Funda Cizgenakad

    PR-Communications Europe, Trend Micro

  • Katarzyna Ferguson
    Katarzyna Ferguson

    Sr - Communications Program Manager Videos, Trend Micro

  • Markus Winkler
    Markus Winkler

    Cloud Solutions Architect, Trend Micro

  • Chris van den Abbeele
    Chris van den Abbeele

    Global Solutions Architect, Trend Micro

  • Hosam Kamel
    Hosam Kamel

    Senior Azure Solution Specialist, Microsoft

  • Felipe Costa
    Felipe Costa

    Solutions Architect, Trend Micro

  • Mohamed Ibrahim
    Mohamed Ibrahim

    Business Development Manager, Trend Micro

  • Michael Draeger
    Michael Draeger

    Red Team Engineer, Trend Micro

  • Tom Bouathong
    Tom Bouathong

    Sales Engineer, Trend Micro

  • Kent Stevens
    Kent Stevens

    Security Solutions Engineer, Trend Micro

  • Keith Rozario
    Keith Rozario

    Senior Solutions Architect, AWS

  • Christina Tee Bautista
    Christina Tee Bautista

    Senior Presales Consultant, Trend Micro

  • David Wright
    David Wright

    Partner Solutions Architect APJ, HashiCorp

  • Richard Alvin Miling
    Richard Alvin Miling

    Technical Director, Netsec Technologies Inc

  • Alex Ng
    Alex Ng

    Director, Insyghts Security

  • Matthew Tan
    Matthew Tan

    Presales Architect, Security Solutions, APAC, NTT

  • Shruthi BP
    Shruthi BP

    Security Researcher, Anlyz

  • Gurmail Singh
    Gurmail Singh

    Cloud Alliances Director, Europe at Trend Micro

  • Aaron Ansari
    Aaron Ansari

    Global Vice President, Cloud Security, Trend Micro

  • Ian Heritage
    Ian Heritage

    Technical Manager, Trend Micro

  • Hamzh Koujan
    Hamzh Koujan

    Cyber Security Consultant, Trend Micro

  • Eslam Saeed
    Eslam Saeed

    System Engineer, Trend Micro

  • Andrew Labib
    Andrew Labib

    Technical Pre-sales Engineer, Trend Micro

  • Farouq Douma
    Farouq Douma

    Cyber Security Consultant, Trend Micro

  • Reham Alyamani
    Reham Alyamani

    Sales Engineer, Trend Micro

  • Mohammed Hashim
    Mohammed Hashim

    Senior Cybersecurity Presales Engineer, Trend Micro